home *** CD-ROM | disk | FTP | other *** search
Text File | 1996-04-23 | 81.5 KB | 2,087 lines |
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- % T H E E M P I R E T I M E S %
- % ------------------------------- %
- % The True Hacker Magazine %
- % %
- % March 11, 1995 Issue 7 %
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- This Issues Features:
-
- # Selection Author Size
- - ------------------------------------ ---------------- ----
- X. Introduction armitage 4k
- 1. Dc Dirt roach 6k
- 2. GL3000 Paging/Voice Retrieval System armitage 26k
- 3. Nokia NAM Programming dr. freeze 4k
- 4. Digital DNA abstract thought 7k
- 5. Defcon III Update dark tangent 27k
- 6. Are you a Hacker? redragon 2k
- 7. Recent Large Name Phreaker Busts anonymous source 3k
- 8. Hacker Learns Intelligence Secrets unknown 3k
- 9. OSS '94 (Third Annual) firefly 5k
-
- ------------------------------------------------------------------------------
-
- Founder: Albatross
- Editor: Armitage
- Contributors: Abstract Thought,
- Dr. Freeze,
- Firefly,
- ReDragon,
- Roach,
- The Dark Tangent.
- Special Thanks: The Anonymous Source,
- Grayarea,
- Invalid Media.
- Noelle,
- Panzer,
- Sevenup,
-
- ===========================================================================
-
- -=- The Empire Times -=-
- Introduction
-
- Well it's been a while since the last issue came out, which is good
- and bad. The good news is that we have a real good issue, and the bad news
- is that it took longer than we wanted it to take. There has been a large
- response to Empire Times, I guess people want it. The mailing list has
- grown to be bigger than we expected it to be. I supose we should stay
- around. We will.
-
- The last issue was somewhat 95% media of hackers. This issue we have
- more technical articles like earlier issues. If anyone would like to join us
- in producing empire times, please feel free to email me.
-
-
- I've read alot in recent magazines and have seen alot on tv recently
- about hackers, and it makes me sick. I don't think the perceptions are
- accurate. Even though it bothers me, being the laid back individual I am
- I don't let it get to me. Maybe that is my fault, maybe it is good though.
-
- I want to send out a message to all the covert hackers and phreakers.
- Not many people have such talents that some of us have. Use them wisely, and
- think about what you are doing before you do it. I am not saying hacking is
- bad (no no, why would anyone think that?). I am just saying that think
- about what you are doing and how you can get caught. I don't want people to
- get locked up like Mitnick and others. Watch yourselves.
-
- I'm going to keep it short and sweet. This is definatly a period of
- busts. Many many fellow hackers have gone 'down'. That is something that
- most people consider the worst thing that could ever happen to a member of
- the computer underground.
-
-
- Till the next Empire Times,
-
- armitage@dhp.com
-
- ==============================================================================
-
- -=- The Empire Times -=-
- Issue 7, File 1 of 9
- DC Dirt #2
- roach@tmok.res.wpi.edu
- roach@cult.empire.org <--- try this one!
-
- I ran the first article of DC Dirt. It looks like the coast is clear.
- I better say what I want before that huge hacker gang beats me up...
-
- ----- Rumor #1 DC Posse?!?!?
-
- Rumor has it there is a new 'Posse' in the DC area. They call
- themselves (oh, take a guess!) 'DC Posse' or 'DC p0sse' or 'DC
- p0ss3' or other inane k-rad statements. The grapevine has told me
- these guys are bad. What the definition of bad is, I don't know.
- Blah. Come on you guys, couldn't you have picked another name?
-
- DC Dirt would-be names for DC Posse/DC p0sse/DC p0ss3:
-
- 1) LoD 2 --- The search for Lex Luthor (startrek joke)
- 2) iCE WaTeR --- We make better ansi's, and goddamn proud of it.
- 3) The Dream Team 2 --- We will crack 1 - 3 year warez.
-
- Not to put down this 'DC Posse', but really guys, be more original.
-
-
- ----- Rumor #2 DiscoDan's box is clearing out.
-
- DiscoDan has had enough trouble with stupid hackers. Almost being
- rm -rf'd, and UMD on his case has not been a great experience for
- him. He is cleaning out all of his users.
-
- Shit. The same thing happened with Lgas' box a year ago.
- When will people learn not to hack from friend's sites?
-
- ----- Rumor #3 Did y-windoze really get busted?
-
- Last issue I said rumor had it that Y-windex was busted. Now I
- hear from sources that no, he wasn't busted. He just wants you to
- think he was busted.
-
- Now Dc Dirt has heard that Y-windoze may have started the rumor
- himself. DC Dirt is confused. But then, DC Dirt is for rumors,
- not real fact.
-
- I talked to Y-windex the other day. He seems alive and kicking.
- He is running out of money, for he doesn't have a new job
- yet. He Better get some if he's going to stay around the
- washington area.
-
- ----- Rumor #4 Someone is busting unregistered WWiV boards.
-
- Supposedly some ding-dong named Equalizer is turning these boards
- in? Does anyone have specifics on this rumor? I imagine there are
- unregistered WWiV bbs' all over the DC area. This is really
- stupid.
-
- ----- Rumor #5 Kewp coming to DC?
-
- Rumor has it, Kewp, who made ISS, or Internet Security
- Scanner, is going to DC 2600 this February. I also hear the
- almighty TK and KL will be there to greet him. Too bad they
- only come around when someone from out-of-state is here.
-
- ----- Rumor #6 DC Kamakize is not a Narc.
-
- Maybe since there are two Kamakize's on the IRC, this lead to the
- confusion. But Kamakize told DC Dirt that he never was a fed,
- Narc, or anything. "Just Homeysan and Tiphoid making this shit
- up." he is quoted. DC Dirt has met Kamakize, and doesn't think he
- is a Narc either.
-
- ----- Rumor #7 SummerCon in the Wind?
-
- DC Dirt has heard that there might be a SummerCon in the DC area.
- Everyone was planning for one last year. But one of the main
- reasons it never came to be was because of HOPE. Other reasons
- that did not help were trying to find an Airport, metro, and a
- cheap hotels around the DC area.
-
- Maybe someone has finally figured out a plan to put all three
- together. SummerCon in DC would be just kewlin.
-
- Other Names for SummerCon in DC:
-
- BustCon '94 -- the only convention that is in a Federal Building!
- FedCon '94 -- Which is the hacker? Which is the fed?
- ParanoidCon '94 -- Not just your regular con...A "DC, FBI, CIA,
- Police, and any other agency down the road"
- Con.
-
- They do all seem to have a same theme, don't they? :)
-
- ----- Rumor #8 Just what did BLAH say on the IRC?
-
- DC Dirt was talking to BLAH on the #hack the other day:
-
- *BLAH* yeah I understand, I like the sound of Candlebox though <Wed Nov 23
- 19:07>
- *BLAH* great group to fuck to, you can quote me on that! <Wed
- Nov 23>
-
- Oh really, BLAH?
-
- ----- Rumor #9 Shadowdancer Busted?
-
- Shadowdancer, a supposed member of the DC p0ss3, was busted.
- No, not because he was hacking .mil's or .gov's...he got busted
- for hacking UMD. Ironic, isn't it?
-
- He was "+ +" the .rhosts file of a librarian he knew. How he
- got the librarian to access her account, Shadow Dancer didn't
- say. Librarians beware! We are going to hack your accounts!
- Bwahahahahahahahaha...
-
- ----- Rumor #10 UMD annex is loggin phone numbers.
-
- Thats right UMD hackers, it seems that now our beloved hacker
- hangout is now loggin our phone numbers. Sigh.
-
- atdt 301403XXXX
-
- CONNECT 9600/ARQ/V32/LAPM/V42BIS
-
-
- Annex Command Line Interpreter * Copyright 1991 Xylogics, Inc.
-
- Checking authorization, Please wait...
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- This was never there before. Also, if you use CallerID, you
- will get hung up by UMD. Looks like you need to try and
- find another dialin, folks.
-
- WELCOME TO THE UMCP/CSC DIAL-UP SERVICE
-
- If you have any questions, please contact the CSC Consulting Lab at
- (301) 405-1500 or consult@umail.umd.edu
-
- Unauthorized access to a computer system is a violation of
- Article 27, Section 146 of the Annotated Code of Maryland.
-
- Computer Science Center terminal servers will only access
- hosts owned by the campuses of the University of Maryland System.
-
- 403-4333 and 403-4444: 2 hour idle limit
- campus extension 34333: 30 minute idle limit
- Dialup sessions lasting longer than 12 hours will be terminated.
-
-
- ----- Rumor #10 Empire now has Waffle, with Internet access!
-
- Albatross finally got off his lazy butt, and got Empire bbs a
- UUCP feed. So now anyone who is on Empire can read the
- Usenet, and have an internet email address at:
-
- yourname@cult.empire.org
-
- Yes, become part of Alabtross' Empire. Email me, Armitage, or
- root (Albatross himself) for the Empire's number. DC hack
- scene is becoming integrated with the net now.
-
- ==============================================================================
-
- -=- The Empire Times -=-
- Issue 7, File 2 of 9
- The Glenayre GL3000 Paging and Voice Retrieval System
- by armitage
- (armitage@dhp.com)
-
- Welcome
- -------
- I am glad you decided to read this article. This article will explain
- the basis of what this system is, show many features, and guide you through
- a few basic operations (pager reactivation, and meet-me setup). This system
- is one of many different paging systems, but I have found many scattered
- through the nation, so if you are wondering what you can do with all those
- carriers found while scanning, compare them to the login screen shown later
- in the article.
-
- Summary
- -------
-
- The Glenayre GL3000 paging and voice retrieval system is a fully featured
- digital radio paging terminal which also provides integrated voice mailbox
- facilities.
-
- I'm sure this is not important, but so you know, the gl3000 family comes
- in 5 different respective sizes (es, s, m, l, and xl). All of the systems
- have same features except the only thing that differs is their bandwith, and
- their capibilities.
-
- Analog and digital paging formats are supported, it provides for tone only,
- voice, numeric, and alphanumeric paging.
-
- Features
- --------
- Voice Mail Box Features
- -----------------------
-
- The voice mail box feature of the system complements the pager router
- system very nicely. This voice mail system is just like any other, so I
- won't go into detail over it.
-
- Programming
-
- Mailbox access code
- Main menu : 1
- Subscriber Information Menu : 1
- Search for subscribers to edit/create
-
- Meetme access code
- Supervisors Main Menu : 5
- System Setup Menu : 3
- Trunk Setup Menu : 11
- Meet-me parameters
-
- Audio Billboard
- Supervisors Main Menu : 5
- System Setup Menu : 9
- Voice Storage and Mailbox Setup Menu : 2
- Voice Mailbox Setup parameters
-
- Pager Alert
- Supervisors Main Menu : 5
- System Setup Menu : 3
- Trunk Setup Menu : 10
- Callere Notification Message Setup
-
- Voice Main Menu Hierarchy
- -------------------------
-
- Supervisor's Main Menu
- 1 < Subscriber Information Menu
- 1 < Edit/Create Subscribers
- 2 < Delete A Subscriber
- 3 < Report Subscriber Information
- 4 < Report Extended Group Members
- 5 < Report Unused Customer Numbers
- 6 < Report Initialized Centirecords
- 7 < Stop Current Report in Progress
- 8 < Send Test Page
- 9 < Block Change Subscribers
- 10 < Delete Several Subscribers
- 11 < Clear Subscriber Call Statistics
- 12 < Report Pager Type Summary
- 13 < Block Create Subscribers
- 2 < User Number Information
- 3 < System Activity Monitoring and Logging Menu
- 1 < Trunk Status & Activity Monitor
- 2 < UOE Status & Activity Monitor
- 3 < Buffer Memory Status & Activity Monitor
- 4 < Transmit Queue Status Activity Monitor
- 5 < Voice Storage Usage Activity Montior
- 6 < Voice Storage Report Setup
- 7 < Voice Storage File Activity Monitor
- 8 < Activity Logging Setup
- 9 < Activity Logging Monitor
- 10 < Subscriber Database Information
- 11 < System CPU Activity Monitor
- 12 < Memory Pool Status Monitor
- 13 < RTC Status & Activity Monitor
- 14 < RTC Diagnostic Console
- 4 < System Maintenance Menu
- 1 < Save Database and System Setup Parameters to floppy
- 2 < Add Customer Numbers
- 3 < Remove Customer Numbers
- 4 < Change Customer Numbers
- 5 < System Setup Menu
- 1 < System Parameters
- 2 < Subscriber Setup Menu
- 1 < Subscriber Default Parameters
- 2 < Subscriber Reoprts Default Parameters
- 3 < Trunk Setup Menu
- 1 < Individual Trunk Parameters
- 2 < Trunk Group Parameters
- 3 < Trunk Card Parameters
- 4 < Common Trunk Parameters
- 5 < Common Trunk Statistics
- 6 < Common Trunk End of Call Parameters
- 7 < Roaming Caller Location Code Setup
- 8 < Digital Trunk Card Alarm Parameters
- 9 < Digital Trunk Address Signalling Protocal
- 10 < Caller Notification Message Setup
- 11 < Meet-me Parameters
- 4 < Buffer Memory Setup Menu
- 1 < Individual Buffer Memory Parameters
- 2 < Common Buffer Memory Parameters
- 5 < Universal Output Encoder (UOE) Setup Menu
- 1 < Individual UOE Parameters
- 2 < Common UOE Parameters
- 3 < UOE Test
- 6 < Transmitter Controller Setup Menu
- 1 < Individual Transmitter Controller Parameters
- 2 < Common Transmitter Controller Parameters
- 7 < Page Routing Setup Menu
- 1 < Logical Area Parameters
- 2 < Coverage Region Parameters
- 8 < Printer and Serial Port Setup Menu
- 1 < Serial Port Configuration Parameters
- 2 < Printer Message Parameters
- 9 < Voice Storage and Mailbox Setup Menu
- 1 < Voice Storage Setup Parameters
- 2 < Voice Mailbox Setup Parameters
- 3 < Voice Mailbox Retrieval Mode Key Translation Map
- 4 < Language Syntax Configuration
- 10 < Pager Parameter Setup Menu
- 1 < PUP/Repeat Page Options
- 2 < PUP/Repeat Page Function Code Setup
- 3 < Voice To Alpha Transcription Setup
- 4 < Numeric/Voice Function Code Setup
- 11 < RTC Port Configuration Parameters
- 6 < Remote Sign-on
- 7 < Network Menu
- 1 < Operator Services Menu
- 1 < Netmail Transmission
- 2 < Netmail Configuration
- 2 < Network Setup Menu
- 1 < Common Network Parameters
- 2 < Network Port Configuration Parameters
- 3 < Network Node Configuration Parameters
- 4 < Frequency Code to Coverage Region Map
- 3 < Network Activity Menu
- 1 < Port Status and Activity Monitor
- 2 < Node Status and Output Queue Activity Monitor
- 8 < Traffic Statistics Menu
- 1 < Statistics Parameters
- 2 < Report Statistics
- 9 < Superhex Patch Screen
-
-
- Operations
- ----------
-
- *** Quick Reference Key Usage***
-
- <DEL> - Deletes character to the left
- <CTRL-R> - Redraws Screen
- UP - Moves pointer up
- DOWN - Moves pointer down
-
-
- System Menus and Options - Navigating the System
- --------------------------------------------------
-
- ***Changing Subscriber Info***
-
- Screen Shot Below
- -----------------------------------------------------------------------------
- GLENAYRE GL3000 PAGING TERMINAL Version 3.06
-
- 1. User Number:________
- 2. Password:
-
- Optional Feature Status
- Agency: ON
- Networking: ON
- RTC: ON
- Meet-me: ON
-
-
- Software Creation Date: MMM DD/YY HH:MM:SS
-
- Command:
-
- -----------------------------------------------------------------------------
- Logging in is the first step, as you can see you are prompted for a user
- number and password. The Default for every account is unpassworded, the
- password does not echo on the screen.
-
- Please Note that the menu options are configured by the access level of your
- account, (for example, an administrators account will have more options than
- a base operators account). The Menus displayed in this article account that
- a supervisors account is being used.
-
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- GLENAYRE GL3000 PAGING TERMINAL Version 3.06
-
- 1. Subscriber Information Menu
- 2. User Number Information
- 3. System Activity Monitoring and Logging Menu
- 4. System Maintenance Menu
- 5. System Setup Menu
- 6. Remote Signon
- 7. Network Menu
- 8. Statistics Menu
- 9. SUPERHEX Patch Screen
-
- Currently Signed On: User 1
- System Supervisor
-
- Command:_________
-
- -----------------------------------------------------------------------------
- This is the Main menu of the system. On a normal operators account, not all
- of the options will be available.
-
- *** To Add (Reactivate a pager) ***
- You want to is Add or "Create" a subscriber. Go to menu 1 (Subscriber
- Information Menu).
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- SUBSCRIBER INFORMATION MENU
-
- 1. Edit/Create Subscribers
- 2. Delete a Subscriber
- 3. Report Subscriber Information
- 4. Report Extended Group Members
- 5. Report Unused Customer Numbers
- 6. Report Initialized Centi records
- 7. Stop Current Report in Progress
- 8. Send Test Page
- 9. Block Change Subscribers
- 10. Delete Several Subscribers
- 11. Clear Subscriber Call Statistics
- 12. Report Pager Type Summary
- 13. Block Create Subscribers
-
- Command:____________
-
- -----------------------------------------------------------------------------
- Now you need to go into option 1 again, to Create a new subscriber.
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- Record 1 of 900 SEARCH FOR SUBSCRIBER TO EDIT/CREATE Page 1 of 2
-
- 1. Customer Number: _____ 17. Language Choice:
- 2. Partition: 18. Answer Type:
- 3. Agency Number: 19. Custom Answer:
- 4. Encoding Format: 20. PUP/Repeat Option:
- 5. Service Type: 21. Group PUP Option:
- 6. Capcode: 22. Repeat Voice:
- 23. Mailbox Type:
- 24. Purge Time (Hrs):
- 7. A-Tone Length: 25. Maximum Messages:
- 8. B-Tone Length: 26. Voice Time:
- 9. Account Number: 27. Activate Caller Pwd:
- 10. Account Status: 28. Access/Caller Pwd:
- 11. Account Code: 29. Autoretrieval:
- 12. Valid: 30. Meet-me:
- 13. Customer Absent: 31. Secondary Number:
- 14. Coverage Region:
- 15. Priority:
- 34. Extended Group:
- 35. Sort Field #1: 37. Sort Field #2:
- 36. Sort Order #1: 38. Sort Order #2:
-
- Command:
-
- -----------------------------------------------------------------------------
-
- It is important at this point, not to enter information into any field other
- than field number 1, as after you enter the customer number, you enter the
- other information later.
-
- If you are entering a new subscriber, you want to enter a customer number
- that is not being used. There will be a record number in the top left to
- show you which records are being used. In this example we will use number 1.
- So enter the new number and then <RETURN>. The type CREATE <RETURN> into
- the command line.
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- Record 1 of 900 SEARCH FOR SUBSCRIBER TO EDIT/CREATE Page 1 of 2
-
- 1. Customer Number: 1____ 17. Language Choice: ENGLISH
- 2. Partition: A 18. Answer Type: SYS 216
- 3. Agency Number: 0 19. Custom Answer: YES
- 4. Encoding Format: TWOTONE 20. PUP/Repeat Option: NO
- 5. Service Type: VOICE 21. Group PUP Option: NONE
- 6. Capcode: 000001F1 22. Repeat Voice: 3
- A=0 B=0 23. Mailbox Type: VOICE
- 24. Purge Time (Hrs): NO PURGE
- 7. A-Tone Length: 8 25. Maximum Messages: 10
- 8. B-Tone Length: 16 26. Voice Time: 8
- 9. Account Number: 4 27. Activate Caller Pwd: YES
- 10. Account Status: 3 28. Access/Caller Pwd: ####/####
- 11. Account Code: 7 29. Autoretrieval: NO
- 12. Valid: YES 30. Meet-me: NO
- 13. Customer Absent: NO 31. Secondary Number:
- 14. Coverage Region: 1
- 15. Priority: 5
- 34. Extended Group: NO
- 35. Sort Field #1: 37. Sort Field #2:
- 36. Sort Order #1: 38. Sort Order #2:
-
- Command:
-
- -----------------------------------------------------------------------------
- The values that are filled into this screen are the defaults that were set
- by the supervisor. Provided you have all the technical information on
- the unactivated pager you have, you will transcribe the pagers technical
- information into this record.
-
-
- List of fields
-
- Field 1 - Customer Number
- Customer number, you may not use wild cards.
- Field 2 - Partition
- Any Partition Letter may be used. ['A'..'Z'] or a NOT sign followed
- by a partition letter.
- Field 3 - Agency Number
- You may use any search conditions except wild cards.
- Field 4 - Encoding Format
- Any encoding format name, or a not sign followed by an encoding
- format.
- Field 5 - Service Type
- You may use any service name, or a not sign w/service type name.
- Service Names
- VOICE
- TONE-ONLY
- NUMERIC
- ALPHANUMERIC
- NUMERIC/VOICE
- MAILBOX ONLY
- ROAMER
- 0 TONE ONLY
- GREETING
- ALPHAMAIL
- TAS
- MEET-ME
- AUTORETRIEVAL
- Field 6 - Capcode
- You may use wild card characters to replace digits.
- Field 7,8 - A,B-Tone Length
- You can use any search but the wild card search.
- Field 9 - Account Number
- You can use any search but the wild card search.
- Field 10 - Account Status
- You can use any search but the wild card search.
- Field 11 - Account Code
- You can use any search but the wild card search.
- Field 12 - Valid
- YES or NO (valid/invalid account number)
- Field 13 - Customer Absent
- YES or NO (absent customer or not)
- Field 14 - Coverage Region
- You can use any search but the wild card search.
- Field 15 - Priority
- You can use any search but the wild card search.
- Field 16 - Trace Calls
- YES or NO
- Field 17 - Language Choice
- Simply enter a language of choice.
- Field 18 - Answer Type
- Use any search.
- Field 19 - Customer Answer
- YES, NO, INSERT, or APPEND
- Field 20 - PUP/Repeat Option
- Field 21 - Group PUP Option
- Field 22 - Repeat Mailbox
- You can use any search but the wild card search.
- Field 23 - Mailbox Type
- You can enter:
- NO MAILBOX
- VOICE
- NUMERIC
- BOTH
- Field 24 - Purge Time (Hrs)
- You can use any search.
- Field 25 - Maximum Messages
- You can use any search but the wild card search.
- Field 26 - Voice Time
- You can use any search but the wild card search.
- Field 27 - Activate Caller Password
- YES or NO
- Field 28 - Access/Caller Password
- Field 29 - Autoretrieval
- YES or NO
- Field 30 - Meet-me
- YES or NO to have this subscriber given access to meet-me features.
- Field 31 - Secondary Number
- You can use any search but the wild card search.
- Field 34 - Extended Group
- YES or NO
-
-
- Now we will move on to the second page of the Section
-
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- Record 1 of 900 SEARCH FOR SUBSCRIBER TO EDIT/CREATE Page 2 of 2
-
- Extended Group Members
-
- 81. Customer Number: 41. System Recording:
- 82. Customer Number: 42. Empty Data Pages:
- 83. Customer Number: 43. Primary Numbers:
- 84. Customer Number:
- 85. Customer Number:
- 86. Customer Number:
- 87. Customer Number:
- 88. Customer Number:
- 89. Customer Number:
- 90. Customer Number: Statistical Fields:
- 91. Customer Number: 51. Number of Calls
- 92. Customer Number: 52. Mailbox Storage
- 93. Customer Number: 53. Character Count:
- 94. Customer Number: 54. Meet-me Time (mins):
- 95. Customer Number: 55. Date Created:
- 96. Customer Number: 56. Date Altered:
-
- Command:
-
- -----------------------------------------------------------------------------
- This page has little signifigance besides if you are using extended group
- members. The one thing that is important is field 56. Look out.
-
-
-
- ***Setting up a Meet-me and its settings***
-
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- GLENAYRE GL3000 PAGING TERMINAL Version 3.06
-
- 1. Subscriber Information Menu
- 2. User Number Information
- 3. System Activity Monitoring and Logging Menu
- 4. System Maintenance Menu
- 5. System Setup Menu
- 6. Remote Signon
- 7. Network Menu
- 8. Statistics Menu
- 9. SUPERHEX Patch Screen
-
- Currently Signed On: User 1
- System Supervisor
-
- Command:_________
-
- -----------------------------------------------------------------------------
- First you want to go into choice "5", The System Setup Menu.
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- SYSTEM SETUP MENU
-
- 1. System Parameters
- 2. Subscriber Setup Menu
- 3. Trunk Setup Menu
- 4. Buffer Memory Setup Menu
- 5. Universal Output Encoder (UOE) Setup Menu
- 6. Transmitter Controller Setup Menu
- 7. Page Routing Setup Menu
- 8. Printer and Port Setup Menu
- 9. Voice Storage and Mailbox Setup Menu
- 10. Page Parameter Setup Menu
- 11. RTC Port Configuration Parameters
-
- Command:_________
-
- -----------------------------------------------------------------------------
-
- >From this menu you want to go to the trunk setup menu which is choice "3".
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- TRUNK SETUP MENU
-
- 1. Individual Trunk Parameters
- 2. Trunk Group Parameters
- 3. Trunk Card Parameters
- 4. Common Trunk Parameters
- 5. Common Trunk Statistics
- 6. Common Trunk End Of Call Parameters
- 7. Roaming Caller Location Code Setup
- 8. Digital Trunk Card Alarm Parameters
- 9. Digital Trunk Address Signalling Protocol
- 10. Caller Notification Message Setup
- 11. Meet-me Parameters
-
- Command:_________
-
- -----------------------------------------------------------------------------
- >From this menu you want to select "11. Meet-me Parameters".
-
- Screen Shot Below
- -----------------------------------------------------------------------------
-
- MEET-ME PARAMETERS
-
- 1. Length of Time to Play Initial Ring(s):
- 2. Wait Time Before Sending Meet-Me Page(s):
- 3. Meet-Me Help Message Interval(s):
- 4. Maximum Number of Meet-Me Help Message(s):
- 5. Tone Played While Waiting for Meet-Me:
- 6. Disable Disconnect Digital During Connection:
- 7. Meet-Me Maximum Hold Time (min):
- 8. Maximum Simultaneous Meet-Me connections:
- 9. Prompt for Access Code Before Meet-Me:
-
-
- Command:_________
-
- -----------------------------------------------------------------------------
- There is online help to guide you to conduct this meet-me. So go with the
- system on this one.
-
-
- Glossary of Terms
- -----------------
-
- I have listed some terms you might have trouble with while you are
- playing around with this system, this is nowhere near as many as there are,
- but the most vital are listed below.
-
- Address - 1. The telephone number dialed by a calling party which identifies
- the party called. 2. A location or destination in a computer
- program.
- Bell 103 - The North American standard for 300 bps modems.
- Bell 212A - The North American standard for 1200 bps modems.
- Blocking - The process of grouping data into transmission blocks. The
- inability of a pabx to service connection requests, usually because
- its switching matrix can only handle a limited number of connections
- simultaneously. Blocking occurs if a call request from a user
- cannot be handled due to an insufficient number of paths through the
- switching matrix; blocking thus prevents free stations from
- communicating.
- Borscht - Acronym for the functions that must be performed in the Central
- office at the subscriber's analog interface of a digital system.
- (battery, overvoltage, ringing, supervision, coding, hybird, and
- test)
- Broadband - A communication system with a large bandwidth.
- Channel - Electronic communications path, usually of 4,000 Hz (voice)
- bandwidth.
- Crossbar - A type of telephone switch.
- Crossbar Switch - (In PABX technology) a switch that has multiple vertical
- paths, multiple horizontal paths, and electromagnetically operated
- mechanical means for connecting any vertical path with any
- horizontal path. Modern PABXs often use an electronic version of
- the crossbar switch.
- Data - In phone systems: any information other than speech or tones.
- Data Set - The telephone companies term for a modem.
- Decoder - A device that converts information into another form of signals.
- (A DTMF decoder converts dtmf tones to numerican dtmf values)
- Dial Long Line - Special Service device which extends loop signalling
- distance.
- Digital - Variable as opposed to constant. Data characters are coded in
- discrete, seperate pulses or signal levels. Contrast with Analog.
- Duplex - Simultaneous two-way independant transmissions in both directions.
- Echo - A faint return of transmitted data.
- ESS - (Electronic Switching System): A telephone switching machine using
- electronics, often combined with electro-mechanical crosspoints,
- and usually with a stored program computer as the control element.
- FCC - (Federal Communications Commision): A government agency that monitors
- and regulates all use of the electromagnetic spectrum for
- communications.
- Handshake, Handshaking - A preliminary process that is part of a
- communications protocal that establishes a data connection.
- Interface - The connection between two seperate and distinct mechanical or
- computerized systems.
- Interoffice Trunks - Shared facilities connecting CO switches.
- Link - A communications circuit.
- Local CO - Central office (end office) capable of switching calls between
- local subscriber circuits.
- Local Loop - The voice-band channel connecting the subscriber to the central
- office.
- Logging - Recording data associated with a system.
- Multiplexing - The division of a transmission facility into two or more
- channels.
- Network - An interconnection of copmuter systems, terminals, or data
- communications facilities.
- Parameters - Selectible variables designed for system uses.
- Port - A computer interface capable of attaching a communication protocol.
- PBX or PABX - (Private <Automatic> Branch Exchange) A system providing
- switching in an office or building.
- Voice PABX - Voice only PABX for voice circuits.
-
- ----------------
-
-
- I hope you could use this information. If anyone has any questions
- or comments, or is wondering if they can get manuals to this system somehow,
- please feel free to email me, I will assist you as much as my schedule will
- allow. I would like to thank erikb for telling me to write this, abstract
- thought for pointing out all my spelling errors among other things, panzer
- for everything he has done, and all the dc hackers.
-
- Knowledge is the nemesis of all evil, Digital Anarchy!!!
- Later, and remember to always cover your tracks in anything you do.
-
-
- Armitage
-
- armitage@dhp.com
-
- finger/email for PGP key if desired.
-
-
-
-
- ==============================================================================
-
- -=- The Empire Times -=-
- Issue 7, File 3 of 9
- Nokia Cellular NAM Programming
- by Dr. Freeze
-
-
- FOR AUTHORIZED DEALER USE ONLY
-
- NOKIA 100 SERIES CELLULAR HANDPORTABLE TELEPHONE
- NAM PROGRAMMING INSTRUCTIONS
-
- The Nokia 100, 105 Series handportable CMT uses an EEPROM NAM that can be
- programmed directly from the standard user keypad. In order to access the
- NAM, you must enter the special access code currently programmed into the
- phone. Once the programming mode is accessed, NAM parameters are loaded by
- entering them into the display and "storing" them to selected memory
- locations. Be sure to obtain all parameters before proceeding.
-
- ACCESS NAM PROGRAMMING MODE:
-
- 1. Turn the phone on. (DUH!)
- 2. Enter the NAM access code. The factory default is: *3001#12345
- 3. Enter [STO] 00.
- 4. Verify that "STORE NOT DONE" appears in the display. If "NOT ALLOWED"
- appears, check to see if you have entered the access code correctly.
-
- Note: If "NOT ALLOWED" appears after a few programming attempts, the
- access code has been changed or an error has occured and the phone
- will have to be returned to Nokia for repair. (BUMMER!)
-
- ENTER SPECIAL NAM PARAMETERS (Memory Location 01):
-
- 5. Press and hold the [CLR] key until the display clears.
- 6. In one long string, enter the special NAM parameters according to the
- format of Example 1 below. Enter each emergency number (such as 911 or
- *911) followed by the pound (#) key, the Language Code followed by the
- asterisk (*) key, and the desired four digit lock code.
- Language Codes: 0 = English, 1 = French, 2 = Spanish.
-
- Note 1: Emergency numbers entered in memory location 01 can be used
- while call restrictions are active and when the phone is locked.
- Note 2: The first number entered in the list of emergency numbers is
- used for the Speed Dial (9) key.
-
- Example 1: Pound Key________________ _________Asterisk Key
- \ \ /
- 9 1 1 # * 9 1 1 # 0 * 1 2 3 4
- / / \ \_______Lock Code
- Emergency numbers__/_________/ \_________Language Code
-
- 7. Enter [STO] 01 [STO].
-
- ENTER MOBILE PHONE NUMBER (Memory Location 02 or 04):
-
- 8. Press and hold the [CLR] key until the display clears.
- 9. Enter the correct 10-digit phone number.
-
- 10. For Primary NAM, enter [STO] 02 [STO].
- For Optional NAM, enter [STO] 04 [STO].
-
- ENTER SYSTEM PARAMETERS (Memory Location 03 or 05):
-
- 11. Press and hold the [CLR] key until the display clears.
- 12. In one long string, enter the system parameters according to the
- format of Example 2 below. Be sure to separate each parameter with
- an asterisk (*). Do not place an asterisk before or after the string.
-
- Example 2: System ID_____ ____Group ID Mark
- \ /
- 3 4 * 1 * 1 * 3 3 4 * 1 5 * 1 5
- / / \ \
- Access Method____/ / \ \_Access Overload Class
- Local Use Mark______/ \______Initial Paging Channel
-
- 13. For Primary NAM, enter [STO] 03 [STO].
- For Optional NAM, enter [STO] 05 [STO].
-
- VERIFY NAM INFORMATION:
-
- 14. Press and hold the [CLR] key until the display clears.
- 15. Use the up/down arrows to scroll through locations 01 through 05.
- 16. Verify that the information for each memory location is correct.
- 17. To exit the programming mode, power the phone off and then back on.
- If "NAM ERROR" appears on the display, programming was done
- incorrectly and must be repeated.
-
- The above information was taken from the Nokia Programming Guide, and was
- typed pretty much as it appears there. The author assumes no responsibility
- for any damages caused by any errors in the above information. The above
- information is for educational purposes only, and the author in no way
- advocates the use of said information to defraud any cellular carrier.
-
- HAVE PHUN!!!
-
- Dr. Freeze
-
-
- ==============================================================================
-
- -=- The Empire Times -=-
- Issue 7, File 4 of 9
- Digital DNA
- by abstract thought
- (abstract@thought.dgsys.com)
-
-
- Life:=the state of an organism characterized by the capacity
- for metabolism, growth, reaction to stimulus, and
- reproduction.
-
-
-
- You may be wondering, why the meaning of life. Well, I want
- you to keep it in mind as you continue to read this article...
-
-
- Viruses. Everyone is familiar with those little miscreant
- programs infecting computers around the world. They sometimes
- consume files, cpu cycles, and other things we value, and the
- almost always hinder productivity. Rarely is a virus completely
- eradicated as they are continually reproducing and inoculating
- other files and computers.
-
-
- There is a reason why computer viruses are called viruses. It
- is because they are *exactly* like biological viruses. Both are
- incredibly small. Where the biological viruses are at least half
- as small as the cells they infect, digital viruses are similarly
- smaller than the files they infect. While viruses inject string os
- protein called DNA into their host cells, their computer
- counterparts inject strings of code, a digital DNA. Later, those
- host cells or programs spread their malevolent viruses to
- neighboring targets.
-
-
- Now that the fact that biological viruses and digital viruses
- are identical has been established, on to the big question. Are
- computer viruses, and other programs, alive?
-
-
- Viruses are one example. The computer viruses meet the same
- requirements for life that the biological ones do. They have a
- metabolism by consuming cpu cycles. Growth is evident in their
- infecting of programs, going from a small piece of code into a
- healthy sized executable file. Reaction to stimuli is evident in
- many viruses. For example, the diamond.105 virus infecting my
- computer science disk. The stimulus is being in memory for about
- 5 minutes, at which point a diamond of little ascii diamonds appear
- and dance around consuming whatever is on the screen. Reproduction
- is hardly a question, there is no doubt that viruses reproduce. So
- in conclusion, viruses are alive.
-
-
- No, I'm not comparing computer viruses to humans. Clearly,
- life does not mean intelligence. Computer viruses may be alive,
- but they do lack intelligence, much like biological viruses. And
- no, they are not natural life. They are as artificial as the
- computers they inhabit. But still, they are alive.
-
-
- Viruses are hardly the only life that programmers have
- created. In a local high school science fair there were two major
- computer exhibits. One was a simple program tracing genetic
- material through a simulated colony. Not exactly fulfilling the
- requirements for life. The other, however, was very interesting.
- The project was a colony of competing creatures. Each had their
- own individual DNA coding that governed the way the moved and
- reacted to stimulus. They had a limited life span, based on
- successful growth and metabolism. As for reaction to stimuli, they
- would avoid simulated poisons and consume the other life forms.
- This is another example of an artificial life form.
-
-
- Another popular trend in computer science is cellular
- automata. In one cellular automata, the life cycle began with a
- clump of cells. These cells would only survive if they could move
- to a position neighboring two other cells. Any more or any less
- and the cell could possibly die. The cells would react to
- neighboring cells and find the best position to move to. If they
- lived long enough, they would be able to reproduce, thus sustaining
- the colony. Again, the qualities of life are shown in a program.
-
-
- Tom Ray, currently a scholar at the Advance Telecommunications
- Research Institute International in Kyoto, Japan, is also convinced
- that programs can live. His reasoning...he breeds digital
- organisms. As a biologist, his initial intent was to study
- evolution. Evolution, however, is a long process, so he resorted
- to creating his specimens. After creating his own operating system
- (so that if there are any escapee programs they won't work on other
- computers), he introduced "the Ancestor". The Ancestor was an 80-
- byte long worm. It was the first and last worm Ray ever created.
- After being set free on Tierra, the digital ecosystem/operating
- system Ray created, the Ancestor bred and spread. A 79-byte mutant
- variation evolved and started to compete with it's predecessors.
- Later came 45-byte worm, then a 51, and the smallest, a 22-byte
- creature. Each worm had it's self-replicated brethren, each
- competing for the necessary cpu cycles to live and reproduce.
- However, something startling happened. Symbiotic relationships
- formed. The 45 and 51-byte worms evolved into viruses lacking the
- genetic code to reproduce. They would infect the larger species
- and use their code to reproduce. In the process, the larger worms
- would receive immunity from other parasites because they didn't
- register in the memory. These evolutionary powerhouses, with
- tighter codes than most human programmers can dream of, have not
- only shown the possibility for digital life, but a digital
- ecosphere like the earth. Tierra became a jungle of worms and
- viruses competing, evolving, and living. There is no doubt that
- there is artificial life.
-
-
- Again, I'm not saying that programs are at the same level
- humans or other organic life. Yet, it would be hard to say that
- some programs are not artificial life. But that is my opinion, and
- I would like to hear yours. If have any thoughts, comments, or
- ideas about this, tell me. And if you agree or disagree, let me
- know why, and if you have some examples, even better. You can e-
- mail me at abstract@thought.dgsys.com. Maybe if the response is
- great enough, I'll write a follow-up. Hopefully you'll be seeing
- more from me, on this topic or others.
-
-
-
- Lastly, I'd like to thank a few people.
- -Armitage, thanks for the chance to write this and for
- all the other things you've done for me.
- -All my friends in my computer science class...Brad, Aaron,
- Mark. We had some good discussions about this and other
- fun things...
- -Everybody in the D.C. scene. I learned a lot by watching
- you all... You may not have seen much of me but I
- learned a lot from you.
-
- ==============================================================================
-
- -=- The Empire Times -=-
- Issue 7, File 5 of 9
- Official Defcon III Update
- by The Dark Tangent
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
-
- DEF CON III Convention Update #1 (1.xx.95)
- August 4-6th 1995 @ the Tropicana in Las Vegas
-
-
- XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON III Initial Convention Announcement
- XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON III Initial Convention Announcement
- XXXXXXxxxxxxXXXXXX X X DEF CON III Initial Convention Announcement
- XXXXXxxxxxxxxXXXXXXX X DEF CON III Initial Convention Announcement
- XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON III Initial Convention Announcement
- XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON III Initial Convention Announcement
- XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON III Initial Convention Announcement
- XXXxxxxxxxxxxxxXXXXXXXX DEF CON III Initial Convention Announcement
- XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON III Initial Convention Announcement
- XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON III Initial Convention Announcement
- XXXXXXxxxxxxXXXXXXXXX X DEF CON III Initial Convention Announcement
- XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON III Initial Convention Announcement
- XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON III Initial Convention Announcement
-
-
- READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE &
- READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE &
-
-
- This is _not_ the professional sounding announcement. Use that one to con
- your boss / employers out of the cost of the trip. The professional
- announcement will be available on the ftp site and other more serious mailing
- lists and news groups, etc. This is the k-RaD kriminal shout out to all u
- el1te haquer types that aren't in jail to attend 'da def con. werd.
-
-
- READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE &
- READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE &
-
-
- What's this? This is an initial announcement and invitation to DEF CON III,
- a convention for the "underground" elements of the computer culture. We try
- to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
- Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
- Groups, CypherPunks, Futurists, Artists, Criminally Insane, Hearing Impaired.
-
-
- WHO: You know who you are, you shady characters.
- WHAT: A convention for you to meet, party, and listen to some speeches
- that you would normally never get to hear from some k-rad people.
- WHEN: August 4, 5, 6 - 1995 (Speaking on the 5th and 6th)
- WHERE: Las Vegas, Nevada @ The Tropicana Hotel
-
-
- So you heard about DEF CON II, and want to hit part III? You heard about the
- parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
- check it out in person? You want to do weird shit _away_ from the hotel
- where you could get me in trouble? Then you're just the person to attend!
-
-
- Sure it's great to meet and party with fellow hackers, but besides that we
- try to provide information and speakers in a forum that can't be found at
- other conferences. While there is an initial concern that this is just
- another excuse for the evil hackers to party and wreak havoc, it's just
- not the case. People come to DEF CON for information and for making
- contacts. We strive to distinguish this convention from others in that
- respect. Plus this year we have official DEF CON GOONS(c) who will pummel
- you until you pass out should you cause problems for other con.friendly
- people! Big Brother loves you!
-
-
- What's been said (Only the good stuff will be quoted, of course)
-
-
- Stevyn - "Why can eye say, it was intense! . . . the whole con just kicked
- ass! I totally recommend you check out the next one."
-
-
- Gail Thackeray, Prosecutor, "It's partly an entertaining party, it's
- partly a fashion statement. But it's mostly something about which the
- business world has no clue."
-
-
- Wendy Murdock, Boardwatch, "Def Con represents the tug-of-war that has
- always been present - people strive to get that which is just out of
- reach, aggravating governments and breaking rules in the process."
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- WHERE IT IS:
-
-
- The Tropicana has rooms reserved for the convention. Rooms are expensive.
- They are even more expensive if you don't book under the convention. If it
- is to expensive for you, please see the section below on Las Vegas www sites tha
- t
- can provide you with information on other nearby hotels that are cheaper.
- Check-in is 3pm, check-out time is 12 noon. Remember there is an 8% sales
- tax in Vegas.
-
-
- 65$ Single or Double room, Midweek (Mon-Thurs)
- 90$ Single or Double room, Weekend (Fri-Sun)
- 350$ One-Bedroom Suite (Call for Availability)
-
-
- The Tropicana, 3801 Las Vegas Blvd. So., Las Vegas, Nevada, 89109
- (702) 739-2581 or (800) 468-9494 or (702) 739-2448 (Fax)
-
-
- Held in three conference rooms at the Tropicana hotel in Las Vegas, DEF CON
- promises to be interesting. The Tropicana has a huge pool (largest in the
- world? Anyway, lots of cool movies have been filmed with this pool in them)
- and in August Vegas should be about 100(f) degrees at one in the morning.
- What do you care? You'll be wired on caffeine and not sleeping anyway. There
- are numerous attractions in town from the strip bars to the local COs in case
- you seek distraction.
-
-
- The Tropicana is located right on the "Strip" with the other three corners of
- the street occupied by the MGM Grand (Largest hotel in the world), the
- Excalibur, and the Luxor (The big sense-net pyramid). If you can afford it
- I totally recommend spending some extra time in town.. there are too many
- cool things to do, especially if you have never visited. Heck, last time I
- got to rent and fire uzi's and MP-5 machine guns (OK, so you can do that for
- free in Los Angeles) see some strippers, and drink 1$ bottles of imported
- beer. What a place! Now you know why I chose Vegas for a location.
-
-
- SPECIAL EVENTS
-
-
- This year there will be a number of special events going down, including:
-
-
- [> Haquer Jeopardy [> Spot the Fed Contest [> Voice bridge
- [> Giveaways [> A Red Box Creation Contest [> A Video Room
- [> Cool Video Shit [> Scavenger Contest [> Who knows?
-
-
- COSTS
-
-
- Because of the increased costs associated with the convention this year, the
- price of admission will be 30$ in advance (See the end of this announcement
- the address to pre-register to) or 40$ at the door. This will include
- your goovie 24bit color name tag and a conference program.
-
-
- Don't forget to factor in Hotel costs, (The more people you crash with, the
- cheaper it is) gambling, food, gas, bail, etc.
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- SPEAKERS
-
-
- This is a partial list of speakers for this year. More are being invited
- or waiting to make plans. As this list changes further announcements will
- be made. This should give you a flavor or what to expect, though.
-
-
- [> Winn Schwartau, Author of "Information Warfare" and "Terminal Compromise,"
- is a consultant to government and the private sector regarding enterprise
- and national security concerns. TOPICS: "Information Warfare, the year
- in review" (Comedic) and "Tempest Attack Videos."
-
-
- [> Len Rose AKA Terminus is root at Bar Net, the largest internet provider in
- the world. Sun Microsystems and HP are some of their customers.
- After the legal fiasco Len faced years ago (as partially chronicled in
- "The Hacker Crackdown." This will be his first chance to speak of his
- experiences without the threat of having his parole revoked. TOPIC: To
- be decided later.
-
-
- [> Chris Hall of Executive Protection will be demonstrating a fully
- equipped "A-Team" van, a fully loaded spy mobile with all types of cool
- interception and surveillance goodies. Last year his talk included an
- overview of surveillance techniques. TOPIC: To be decided later.
-
-
- [> Sarah Gordon, AKA Theora, a veteran of DC II will be presenting another
- speech this year. Last year she organized a round table discussion
- with Phil Zimmermann and Presence, and revealed that the Anonymous
- remailer anon.penet.fi was compromised. TOPIC: Not Announced Yet.
-
-
- [> Curtis Karnow, former federal prosecutor and attorney focusing on
- intellectual property litigation and computer law. TOPIC: Agents in the
- telecommunications context, and "smart" software that we 'trust' to do the
- Right Thing. The specific issue is legal liability and responsibility for
- the actions of intelligent agents, and then spinning off to chat about the
- liability for artificial intelligence generally.
-
-
- Speakers will be talking Saturday and Sunday, and maybe Friday depending.
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- SPECIAL EVENTS
-
-
- So you think you're so damn smart, eh? Think your shit doesn't stink?
- Right. Think you got one up on the Feds, huh? Well, now's your chance to
- prove it smarty-pants. Winn Schwartau will take command and moderate.
-
-
- ! A N N O U N C I N G !
-
- H A C K E R J E O P A R D Y
-
- That's right. You can now prove how smart you really are. Get up on stage
- and question a few answers, pile up the points . . . and win big!
-
- You know the game. You know the rules. Now all you have to do is have the
- guts, get up on stage in front of your peers and the narcs and show us all!
-
- When? After Dark Tangent's opening speech (which we're all really looking
- forward to . . . [yawn] HACKER JEOPARDY starts!
-
-
- MIDNIGHT - DAY 1 of DEFCON.
-
-
- If you wanna play . . . show up. If you don't wanna play, don't show up.
-
-
- There will be three rounds of three people. Just like real. The winners of
- each round will go into the Finals and the winner of that will win 25,000
- units of some foreign currency! From Dark Tangent himself! Plus:
-
- - A t-shirt three sizes to small for the women
- - No t-shirts for the men.
- - Silk jackets for everyone.
- - One Heineken per player per round at DT's expense.
- - Round trip directions to Hoover Dam
- - Phiber Optik's home address
- - Eric Bloodaxe's Blood Samples
- - And more . . .
-
-
- Contestants will be picked at random from a pool of those who want to play.
- If you don't wanna play, don't enter the contest. Only the elite survive!
-
-
- FEDS: If you get picked to play, and we ask you what your job is, YOU HAVE
- TO TELL THE TRUTH! If you don't, our custom Fed-O-Meter will detect your
- lies and off to the casinos you go!
-
-
- Potential categories for questions include:
-
-
- - - Famous Busts - Famous Narcs - UNIX Bugs - Telco Tech - "Hacking"
- and beware of the killer daily double. Bribing the judge is acceptable.
-
-
- So, in the inimitable words of Al Bundy . . . LET'S ROCK!
-
-
-
- 3rd ANNUAL SPOT THE FED CONTEST
- Spot the fed, win the shirt
-
-
- "Like a paranoid version of pin the tail on the donkey, the favorite sport
- at this gathering of computer hackers and phone phreaks seems to be hunting
- down real and imagined telephone security and Federal and local law
- enforcement authorities who the attendees are certain are tracking their
- every move.. .. Of course, they may be right." John Markhoff, NYT
-
-
- Basically the contest goes like this: If you see some shady MB (Men in
- Black) earphone penny loafer sunglass wearing Clint Eastwood to live and
- die in L.A. type lurking about, point him out. Just get my attention and
- claim out loud you think you have spotted a fed. The people around at the
- time will then (I bet) start to discuss the possibility of whether or not a
- real fed has been spotted. Once enough people have decided that a fed has
- been spotted, and the Identified Fed (I.F.) has had a say, and informal vote
- takes place, and if enough people think it's a true fed, or fed wanna-be,
- or other nefarious style character, you win a "I spotted the fed!" shirt,
- and the I.F. gets an "I am the fed!" shirt.
-
-
- Note to the feds: This is all in good fun, and if you survive unmolested
- and undetected, but would still secretly like an "I am the fed!" shirt to
- wear around the office or when booting in doors, please contact me when no
- one is looking and I will take your order(s). Just think of all the looks
- of awe you'll generate at work wearing this shirt while you file away all
- the paperwork you'll have to generate over this convention. I won't turn in
- any feds who contact me, they have to be spotted by others.
-
-
-
- TELEPHONE CONFERENCE BRIDGE
-
-
- For DEF CON III there will be a dial in conference set up. If you are
- overseas, or just too poor to make it to the convention this year, you can
- still get an idea of what is going on and participate. One part of the voice
- conference equipment will allow you to listen to the convention room
- microphone, another will allow you to ask questions during the Q&A sections
- of peoples speeches. A general conversation area will be up so you can chat
- with others at the convention, or just others dialed into the bridge.
-
-
- As more technical information and phone numbers become available for the
- bridge I will post them in future convention updates.
-
-
- Navigate through the voice mail maze and get free phone sex! Impress others!
-
-
- SPOOAH DOOPAH RAFFLE GIVE AWAY!@#
-
-
- Throughout the convention, between speakers and events there will be a raffle
- giveaway in which if your number is drawn, you win the prize. Last year's
- giveaway included an ancient kaypro monochrome portable, a roll of Sprint
- "security" tape, "Computer Warriors" evil anti-virus cartoon, a 240 meg IDE
- HD, and other elite things.
-
-
- >> All the prizes given away are donated by other convention goers, so if <<
- >> you have any stuff to give away, please save and donate it to the con! <<
-
-
- RED BOX BUILDING CONTEST
-
-
- While we don't encourage or condone the use of toll fraud devices, we do
- encourage creativity and expression of thought. We combine these and come
- up with a red box creating contest. The final device doesn't have to
- produce the real red box tones (Can't have people getting arrested) BUT it
- does have to produce some tones like with the stock crystal. This contest
- is inspired by last year's give away of a red box "Big Red" that looked just
- like a big pack of Big Red gum, but really was a red box. Elite! There was
- also a little girl's doll that was a red box, but the switch for that one was
- hidden under the dress and, well, it just wasn't given away.
-
-
- Come up with unique ideas! With just a Hallmark card and some spare time you
- can create an elite 007 style tone generating device! What will you win if
- yours is chosen as the most k-rad beside the envy of fellow hackers? You'll
- get a tee shirt and the cost of admission to the convention refunded PLUS
- some as-of-yet undecided prize. I bet you just can't wait to burn your
- fingers with your soldering iron now!
-
-
- THE VIDEO ROOM
-
-
- In one of the rooms a LCD wall projector will be hooked up connected to a
- VCR, and people can bring flicts to play. Stuff like Max Headroom, War Games
- etc. You know, the cool cheesy stuff. Also some "hacker" videos will be
- shown. If you have something you wanna show, bring it along. When the
- projector is needed in the main conference room it will be swiped for the
- duration.
-
-
- COOL VIDEO SHIT
-
-
- At this time we are working to see if a T1 connection is possible. If it is
- there will be a cu-see me connection set up with multiple video cameras in
- various locations. Images will also be added automatically to a WWW page for
- people to snag. As all this works itself out there will be further
- announcements. No, there will be no "Hack our server" contests, and there
- will be "Security Professionals" with "Diagnostic Tools" to "Correct" any
- people who may case the network problems.
-
-
- SCAVENGER CONTEST
-
-
- A scavenger contest is being planned. The person or group with the most
- number of items on the list wins the prize. (Prize undetermined as of yet)
- and there will be a few follow up prizes. Don't forget to carry massive
- amounts of water as you run about the concrete jungle, dehydration can
- happen just crossing the street. This is a contest for only the most k-rad.
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- WHAT YOU CAN DO TO HELP
-
-
- DEF CON III will be planned right up until the last minute, with problems
- being fixed and new things being added all along.. a sort of work in progress
- that you get to witness in person when you show up. Hopefully it won't be
- too messed up when presented to the public. What can you do to help?
-
-
- - -> We are looking for people to speak on Personnel Information Gathering and
- selling. Hopefully a speaker (who could remain anonymous) in this area
- has experiences in gathering and selling such information. If you know
- of such a person, please invite them to contact me or let them know we
- are looking for such speakers.
-
-
- - -> We are looking for some people to submit artwork to be used in the
- convention someplace. It could be a poster, or in the program. Black
- and white art would be eligible for the program only.
-
-
- - -> Articles and interesting ftp sites, www pages, mini FAQs, etc. are all
- wanted for the program. Quality articles that are informative and apply
- to the theme of the convention. Scanner frequency lists,
-
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- MORE DEF CON INFORMATION
-
-
- The World Wide Web Page is located at: http://dfw.net/~aleph1/defcon
-
- FTP Site: ftp.fc.net /pub/defcon
-
- Mailing lists: mail majordomo@fc.net with the following statement in the body
- of your message: subscribe dc-announce This will set you up on the mailing
- list and you will receive updated information, information on the other
- mailing lists offered, etc. I suggest joining the dc-stuff list just so you
- can talk and plan with other people going to the con to coordinate rides,
- sharing of rooms, etc.
-
- Voice or Voice Mail: 0-700-826-4368 from a phone with AT&T LD.
-
- E-Mail: dtangent@defcon.org (The Dark Tangent)
-
- Snail Mail: 2709 E. Madison #102, Seattle, WA, 98112
-
- BBS System to call for info if you don't have net access:
-
- Alliance Communications - +1 612 251 2511 - USRobotics HST DS 16800
- NUP: New World Order
- Underground Information for Security Professionals and interested parties.
- Formerly ASU Underground in Tempe, AZ (602) & Radio Waves in MN (612).
- Associated Electronic News Network from American Justice Federation
- International Information Retrieval Guild Distro Site, Electronic Frontier
- Foundation MEMBER, and Phantasy Magazine Distribution Site.
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- INFORMATION ABOUT LAS VEGAS
-
-
- NEWS GROUPS
-
-
- Please note the following newsgroups may or may not be designated for local
- distribution (Distribution: Vegas and/or nv), and is intended for all
- systems in the Las Vegas area or those interested in same on the same level
- as the la, ca, ba, ny, nyc, and other similar local higherarchies:
-
-
- vegas.bi Talk for bisexually natured persons
- vegas.config Configuration discussions for the higherarchy
- vegas.food Anything about food in Las Vegas
- vegas.for-sale For Sale/Want ads (no commercials, please!)
- vegas.general General discussion
- vegas.jobs Jobs offered and wanted in Las Vegas
- vegas.motss MOTSS community talk
- vegas.personals Personal ads - any nature
- vegas.singles Talk for singles
- vegas.test Group to test post to
-
-
- WWW PAGES about Las Vegas, Hotels, Things to do, etc.
-
-
- HTTP://www.infi.net:80/vegas/online/
- HTTP://www.ocf.berkeley.edu/~iew/index.html
- HTTP://www.best.com/~rdc/roger/vegas.html
- HTTP://www.intermind.net/las.vegas.on-line/homepage.html
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- STUFF TO BUY
-
-
- Stuff is for sale from DEF CON I and II in case you are interested. From the
- first year we have audio tapes (4 90 minute tapes) for $20 and the second
- year (10 90 minute tapes) for $30. Descriptions of these tapes are below.
-
-
- DEF CON I Tapes (4) include the following speakers:
-
-
- Ray Kaplan, Curtis Karnow, Gail Thackary, Dead Addict, Dark Druid, Judi Clark
- Dan Farmer, and Dr. Mark Ludwig.
-
-
- DEF CON II Tapes (10) include the following speakers:
-
-
- Phillip Zimmermann : Keynote Speaker, PGP.
- Gail Thackary : Response to Mr. Zimmerman and Privacy issues.
- Chris Hall : Electronic Surveilance.
- Curtis Karnow : Recombinant Culture, Crime in the Digital Network.
- Dr. Mark Ludwig : Virus Creation Awards and What to do when the Feds come.
- Judi Clark, Mara, Fen and Marianne in a Round Table Discussion.
- The Dark Knight : Hacking in the U.K.
- Sara Gordon, Mark Aldrich, Phil Zimmerman: Internet and PGP privacy concerns.
- Annaliza (Torquie) : The European Underground scene.
- Mark Lottor : Various cellular topics.
- Winn Schwartau : HERF guns, Van Eck, Information Warfare
- Peter Beruk : The role of the SPA, general Q&A.
- Padgett Peterson : Anti-Virus writing, Cleaning up other peoples messes.
- The Jackal : A basic radio overview with Q&A.
- Artimage : Underground spoof and give aways.
- Stephen Dunifer : Radio Free Berkeley and pirate media.
- Damien Thorn : Random Cell information from the late night tech talks.
-
-
- SHIRTS are still available to buy. The ones remaining are long sleeve white
- with the choice of two styles. Both styles have a three color logo on the
- front (Red, Gray, Black) with "DEF CON". The back is either a list of
- strange grep key words and "inside" keywords with "Why? Because I can." at
- the top. Back #2 is the same back as DEF CON I with the old and "new" 4
- Amendment as stated by J.P. Barlow with "Protect your rights, Encrypt your
- data..." at the top. The back on this style is two colors.. black lettering
- framed in light gray for better definition. Shirts are $20.
-
-
- SHIPPING : If you buy anything, please include 2.90 for priority shipping.
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- LAST AND LEAST
-
-
- OK! Your almost ready to go. Now here is an E-Z to follow checklist of
- things you should take care of before throwing caution to the wind and
- bailing out to the dangerous and sexy-wrong world of Las Vegas. In the
- words of one famous (and abused) phone system: "Sit up straight, PAY
- ATTENTION, Listen to what your being told. (Now try again)" (Whoever can
- identify that phone system first gets in free)
-
-
- StUPh 2 D0 b3fore the C0nvent1ion:
-
-
- _ Check out inpho about Vegas so you know what you wanna do.
- _ Get a hotel room or some crash pad.
- _ Bring $40 for admission or pay $30 in advance.
- _ Bring your PGP key on disk to key sign with others.
- _ Bring Laptop, laplink, serial, and bizarre gender changer cables.
- _ Bring things to donate for the give-away raffle.
- _ Leave massively incriminating evidence at home.
- _ Police scanners can provide hours of fun in Vegas.
- _ Bring interesting videos to play in the video room.
- _ Caffeine and snacks are fun to eat.
- _ Don't forget any drugs or medication you may need.
- _ You won't need saline for your contact lenses, you won't be sleeping.
- _ Anything you promised your friends you would bring for them.
- _ Join the mailing list and arrange rides or rooms with others in advance.
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- MY PGP KEY
-
- This is the unsigned version
- My signed version is available on the public key-servers
-
-
- ------BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.6.1
-
-
- mQCNAy6v5H8AAAEEAJ7xUzvdRFMtJW3CLRs2yXL0BC9dBiB6+hAPgBVqSWbHWVIT
- /5A38LPA4zqeGnGpmZjGev6rPeFEGxDfoV68voLOonRPcea9d/ow0Aq2V5I0nUrl
- LKU7gi3TgEXvhUmk04hjr8Wpr92cTEx4cIlvAeyGkoirb+cihstEqldGqClNAAUR
- tCZUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
- =ngNC
- ------END PGP PUBLIC KEY BLOCK-----
-
-
- :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
- WHY IS THE ANNOUNCEMENT SIGNED?
-
-
- Well, last year it came to my attention that some unknown person in
- California had modified an announcement and was having people mail their
- pre-registration money to them instead. It was actually pretty funny. Only
- one person was fooled and lost 10$. Not bad. I knew something was up when
- he said he had pre-registered for 10$ and had the receipt I had supposedly
- mailed back. I am never that organized! To avoid potential problems like
- this one please verify this announcement!@# My key is available for
- verification on public key servers, and my key-id is 46A8294D. The
- other key you will find on servers may be my older 1284bit key, which is
- still good, but just not used to sign this text.
-
-
- END ANNOUNCEMENT ------------------------------------------------------------
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.6.2
-
-
- iQCVAwUBLx9EqstEqldGqClNAQF+tQP/fVRMKLwHOjPFiizoFFVR0gjMnP/J/L24
- 1DhCJvw6ePaFAwuVHoRYenYulvoJVcRGnL+Do8ZXNqZ1Hz0oGQjcb7A0sW5BxJi6
- VL6CCKIM8oCnsQQYlxvUn+omaVDXqfjcKNnehLTg0jrLAOjMUBaO9mt392MHN+Tb
- Icw0yVEHU1g=
- =Jq1x
- -----END PGP SIGNATURE-----
-
-
- ==============================================================================
-
- -=- The Empire Times -=-
- Issue 7, File 6 of 9
- Are You a Hacker?
- by ReDragon
-
- Take a little quiz for me today. Tell me if you fit this
- description. You got your net account several months ago. You have been
- surfing the net, and you laugh at those media reports of the information
- superhighway. You have a red box, you don't have to pay for phone calls.
- You have crackerjack, and you have run it on the password file at a unix
- you got an account on. Everyone at your school is impressed by your computer
- knowledge, you are the one the teachers ask for help. Does this sound
- like you? You are not a hacker.
- There are thousands of you out there. You buy 2600 and you
- ask questions. You read phrack and you ask questions. You join
- #hack and you ask questions. You ask all of these questions, and you
- ask what is wrong with that? After all, to be a hacker is to question
- things, is it not? But, you do not want knowledge. You want answers.
- You do not want to learn how things work. You want answers. You do not
- want to explore. All you want to know is the answer to your damn
- questions. You are not a hacker.
- Hacking is not about answers. Hacking is about the path you
- take to find the answers. If you want help, don't ask for answers,
- ask for a pointer to the path you need to take to find out those answers
- for yourself. Because it is not the people with the answers that are
- the hackers, it is the people that are travelling along the path.
-
-
- -ReDragon
-
- ==============================================================================
-
- -=- The Empire Times -=-
- Issue 7, File 7 of 9
- Recent Large Name Phreaker Busts
- by anonymous
-
-
- February 22, 1995
-
- Did you wake up that Wednesday and decide it was a good day to get raided?
-
- Well, at least nine people had the pleasure of that experience.
-
- Rumors were slow to circulate. Even now, two weeks later, it's not clear to
- anyone who exactly was raided, where, why, or if they had been arrested as
- well.
-
- One thing all the people have in common: Southwestern Bell - or at the very
- least, the desire and ability to hack all the switches on the west coast.
-
- We know about Dispater (TEX), KC, Gatsby (and his girlfriend), Mark
- Tabas, Dr DeLam, Zibby, Phantom Phreaker, and Zero Page. While the
- investigation seems to be based in Dallas, Texas, the people come from
- different states: Illinois, Florida, Pennsylvania, Washington, California,
- and maybe Canada. The primary suspect? Zibby. It's rumored the phreakers
- had a good idea the raids were coming.
-
- So what did the FBI do, and how long have they been monitoring these people?
- Well, they have surveillance photos of some of the people involved. Apparently
- the fact that certain individuals had been together at some point in time
- is very interesting. Could they be fishing for a conspiracy charge, perhaps?
- They seemed to be very interested in confiscating bank statements and so forth;
- something to do with money laundering? Cellular fraud is a given. And of
- course, consistency being something federal investigators are known for,
- some cellular phones were taken, but _some_ were not. Certain people were
- threatened with indictments within two weeks; some were told they would
- probably never be disturbed again. One thing is for certain: their personal
- possessions will be gone for a very long time, possibly forever.
-
- A phone company employee was rumored to have stated, "it's not what
- they did to the switches and such, it's HOW they did it". An amusing
- anecdote has been told about Dispater, "Supposedly he tried three times
- to sell the CC numbers he had, and got ripped off every time!" Apparently,
- not everyone knew or approved of anyone making money off of their pursuits.
- It's also rumored that phone calls were made overseas to military bases in
- "hostile countries".
-
- There's some question about what these raids have to do with other
- recent events, such as the Kevin Mitnick arrest. While at least one
- of the people raided had connections to Mitnick, it appears that had
- nothing to do with what happened on February 22.
-
- --------------------
- Special thanks to Super Happy Fun Ball.
-
- ==============================================================================
-
- -=- The Empire Times -=-
- Issue 7, File 8 of 9
- Hacker learns intelligence secrets
-
-
- -----gotten from RISKS Forum------
-
- Subject--Hacker learns intelligence secrets
-
- The London "Independent" newspaper of 24-Nov-94 leads with a story
- that a "hacker" gained access to a sensitive database of
- telecommunications information at British Telecommunications (BT), the
- UK's largest (and ex-state owned) carrier. The story was also carried
- by all the major television and radio news programmes.
-
- Tim Kelsey, author of the Independent story, reveals that details such
- as telephone numbers and addresses for secret installations of the
- Ministry of Defence, MI5 (the British intelligence agency responsible
- for the UK) and MI6 (like MI5, but handles non-UK affairs).
-
- "Thousands of pages of highly confidential BT records were sent across
- the Internet to a young Scottish journalist, Steve Fleming, in July".
- Mr Fleming received the information after making a news posting asking
- for information on BT and hacking. The informant remained anonymous
- --
- details of how this was achieved are not given.
-
- The hacker also gave details to Mr Fleming about how he too could
- access the information. He applied through an employment agency for a
- short-term contract at BT as a database designer, clearly stating on
- his CV that he was a freelance journalist. He got the job, and was
- able to gain access to the information because passwords were just
- left lying around the office.
-
- BT is still going through a major staff restructuring programme, and
- as a result has a large number of temporary (contract) staff. These
- staff need passwords to the system to legitimately carry out their
- jobs, but because of the constant flow of people, the passwords are
- often written down.
-
- Mr. Fleming learned, among other things,
-
- * The location of MI6's training centre ("spy school"), located in
- a non-descript building next to a pub in south London
- * Information about the bunker in Wiltshire where the Government
- would go in the event of nuclear war
- * Details of telephone installations at Buckingham Palace and 10
- Downing Street [the Prime Minister's home], including
- personal lines to John and Norma Major.
-
- The system itself, the "Customer Services System", was designed and
- implemented by an American company, Cincinnati Bell. It is supposed to
- have internal mechanisms to prevent hacking (!)
-
- So, what are the risks (briefly!)
-
- 1) Allowing temporary staff passwords that allow almost any
- data to be retrieved. It sounds as if the security
- levels of the database were either non-existent,
- or compromised.
- 2) Keeping sensitive information in the same database
- as non-sensitive information.
- 3) The age-old chestnut of the uses of passwords.
-
- A BT spokesman, speaking on the "Today" programme on BBC Radio 4
- confirmed that a "top level" investigation had been launched, but
- refused to confirm or deny that the hack had taken place.
-
-
- ==============================================================================
-
-
- -=- The Empire Times -=-
- Issue 7, File 9 of 9
- OSS '94
- by firefly
-
- OSS '94 -- Third Annual Symposium on National Security
- And National Competitiveness -- Open Source Solutions
-
- In its third year of existence, and my second year of
- attendance, Open Source Solution's international 3-day
- conference is a mix of government, commercial, private
- citizens, and hackers joining together to discuss the
- implications of a National Knowledge Strategy. For those
- of you new to this series, OSINT (or OSCINT) is the
- intelligence technique of using public and unclassified
- data from any source to meet your intelligence needs. As
- I wrote in the first few segments in this column, this
- ranges from dumpster diving to CDROM databases to the
- Library of Congress to social engineering. If you've
- read my series, you know of Robert Steele. Hell, if you
- went to HOPE, you know him, he gave the elite keynote
- address with the flashing lights and all. Robert pulls
- together the best and brightest to speak and hold panel
- discussions at this conference.
-
-
- The affair lasted three days at the Raddison Hotel in
- Alexandria. It was an intense period, the first speaker
- started at 8am and they went thru until almost 5. Then
- came the daily networking reception where people could
- mingle, have some drinks and talk shop, and (last year)
- the few college seniors who were interning there could
- pass out resumes' and hope for jobs. Hey, it worked for
- me. OSS '94 boasted over 1000 attendees, 75 corporate
- sponsors, and 30 volunteers.
-
-
- I won't bore you with the details of the plenary sessions,
- but will tell you that some notable members of our side of
- the house were in attendance. Chris Goggans, Emmanuel, Bob
- Stratton, Rop Gongrijpp (sp?), and a few others headed up
- some of the panels on the pros/cons of hackers and the
- influence hackers (and those who know how to REALLY use
- computers in general) have on the ability of a company to
- get OSINT. Funny, these panels were PACKED with people --
- there was not even standing room. In the Goggans-Stratton
- panel, there were 150 people in a room designed for 50!
- On a side note, I think that the NASA Atlas of Mars is a
- new hacker item, as the NASA reps gave a copy to Emmanuel,
- me, and a few other hackers (more so to get rid of them,
- I think, but funny nevertheless as ONLY hackers took 'em)
-
-
- Some big speakers included: Ambassador Holmes, Assistant
- Secretary of Defense for Special Operations and Low-
- Intensity Conflict (speaking about waging wars in the
- depths of cyberspace); Winn Schwartau, author of Terminal
- Compromise and INFOWAR (speaking about Information Warfare);
- Paul Fuchs, Director of the Red Cross (speaking about how
- OSINT and computers aid humanitarian operations); Loch
- Johnson, WELL-KNOWN author of intelligence books (speaking
- on the dark future of the CIA); and Robert Steele, who
- presented his Knowledge Strategy Thesis to the group.
-
-
- For you paranoid freaks, there were about 20-40 NSA people
- in the crowd, identified by the cryptic nametag that said
- only "Department of Defense". Hmmm. They hung around by
- themselves in their own little cliques. Very few spoke to
- anyone else. Kind of makes you wonder what it would be to
- work for the Big Bruiser of Fort Meade. I dunno. I like to
- interact with people, not just PCs, codewheels, and Never
- Say Anything.
-
-
- OSS is an international event, and the premise behind it is
- just as large. Robert Steele's basis for forming Open Source
- Solutions is to not only provide cost-effective information
- to whoever needs it (government or private sector), but to
- illuminate the expanding global connections and essentially
- publicize the Power of Information.
-
-
- Steele professes the need to "Restructure and Reinvent
- Intelligence". For those who don't know, intelligence is not
- CIA stuff. It's simple information. Yes, CIA uses information
- and puts a TOP SECRET classification on it. That's where
- Steele goes nuts. He says that (and I agree with him) that by
- using open sources, one can obtain better information/intelligence
- than by only using Spooky Secret Spy Stuff, and at a VERY SMALL
- FRACTION of the cost. It costs more to classify and manage this
- classified information than it does to look for the same stuff
- through open sources.
-
-
- Overall, OSS '94 was a bounding success. If anyone is interested
- in OSINT, feel free to contact me at firefly@cult.empire.org or
- at other well-known non-government addresses.
-
-
- -- Firefly
- Resident OSINT Consultant
-
-
- ==============================================================================
-
- -=- The Empire Times -=-
-
- =============================================================================
-
-
- The Empire Times Q & A Section.
-
- Where can I get The Empire Times?
-
- Via BBS
-
- This is provided that you are on these systems, none accept many new
- callers, so the #'s are not listed, that is not to be mean. It is just
- that the System Operators are satisfied with their user lists at the
- current time.
-
- [NPA] [#] [System Name] [System Operator]
- ----- ------------- ---------------------- -----------------
- (301) PRIVATE Empire Albatross
- (703) PRIVATE Digital Anarchy Armitage
- (602) PRIVATE Unphamiliar Territory Invalid Media
- (+49) XXXXXXXXX Secret Techtonics Sevenup
-
- Via Anonymous FTP
-
- etext.archive.umich.edu (ftp.etext.org) /pub/Zines/Emptimes
- fc.net /pub/defcon/EMPIRE
-
- Via World Wide Web
-
- I'm sure it's on a few of them..
-
- Via The Empire Times Mailinglist
-
- Mail armitage@dhp.com with "subscribe emptimes <your mail address>" in the
- context of the message. To request old issues, just put
- "request emptimes # <your mail address>" where # is the issue #.
-
- Where can I get in touch with any of the writers, or contributers?
-
- Erudite/Armitage armitage@dhp.com
- The Dark Tangent dtangent@defcon.org
- PuD C0ur13r roach@tmok.res.wpi.edu
- Invalid Media upt@bud.indirect.com
- Firefly firefly@cult.empire.org
- Noe11e noelle@phantom.com
- Drunkfux drunkfux@usis.com
- Okinawa okinawa@madhouse.com
- Grayarea grayarea@netaxs.com
- Dr. Freeze drfreeze@cult.empire.org
-
- Can I write? Where can I send my Article Submissions?
-
- You can mail Armitage or Albatross on either Digital Anarchy or
- Empire. You can also mail them to me personally at armitage@dhp.com with
- "Submission" as the title, or in a piece of mail before it.
-
- ==============================================================================
-
- -=- The Empire Times -=-
-
- =============================================================================
-
-